Jedidiah Crandall
Jedidiah Crandall
Associate Professor, Arizona State University
Bestätigte E-Mail-Adresse bei
Zitiert von
Zitiert von
Minos: Control data attack prevention orthogonal to memory model
JR Crandall, FT Chong
37th International Symposium on Microarchitecture (MICRO-37'04), 221-232, 2004
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits
JR Crandall, Z Su, SF Wu, FT Chong
Proceedings of the 12th ACM conference on Computer and communications …, 2005
ConceptDoppler: a weather tracker for internet censorship.
JR Crandall, D Zinn, M Byrd, ET Barr, R East
CCS 7, 352-365, 2007
The Velocity of Censorship:{High-Fidelity} Detection of Microblog Post Deletions
T Zhu, D Phipps, A Pridgen, JR Crandall, DS Wallach
22nd USENIX Security Symposium (USENIX Security 13), 227-240, 2013
Analyzing the Great Firewall of China Over Space and Time.
R Ensafi, P Winter, A Mueen, JR Crandall
Proc. Priv. Enhancing Technol. 2015 (1), 61-76, 2015
Temporal search: Detecting hidden malware timebombs with virtual machines
JR Crandall, G Wassermann, DAS De Oliveira, Z Su, SF Wu, FT Chong
ACM SIGOPS Operating Systems Review 40 (5), 25-36, 2006
Empirical study of a national-scale distributed intrusion detection system: Backbone-level filtering of HTML responses in China
JC Park, JR Crandall
2010 IEEE 30th International Conference on Distributed Computing Systems …, 2010
Minos: Architectural support for protecting control data
JR Crandall, SF Wu, FT Chong
ACM Transactions on Architecture and Code Optimization (TACO) 3 (4), 359-389, 2006
ExecRecorder: VM-based full-system replay for attack analysis and system recovery
DAS De Oliveira, JR Crandall, G Wassermann, SF Wu, Z Su, FT Chong
Proceedings of the 1st workshop on Architectural and system support for …, 2006
Synchroscalar: A multiple clock domain, power-aware, tile-based embedded processor
J Oliver, R Rao, P Sultana, J Crandall, E Czernikowski, LW Jones IV, ...
ACM SIGARCH Computer Architecture News 32 (2), 150, 2004
Experiences using Minos as a tool for capturing and analyzing novel worms for unknown vulnerabilities
JR Crandall, SF Wu, FT Chong
International Conference on Detection of Intrusions and Malware, and …, 2005
Idle port scanning and non-interference analysis of network protocol stacks using model checking
R Ensafi, JC Park, D Kapur, JR Crandall
19th USENIX Security Symposium (USENIX Security 10), 2010
Detecting intentional packet drops on the Internet via TCP/IP side channels
R Ensafi, J Knockel, G Alexander, JR Crandall
International Conference on Passive and Active Network Measurement, 109-118, 2014
Three Researchers, Five Conjectures: An Empirical Analysis of {TOM-Skype} Censorship and Surveillance
J Knockel, JR Crandall, J Saia
USENIX Workshop on Free and Open Communications on the Internet (FOCI 11), 2011
Every rose has its thorn: Censorship and surveillance on social video platforms in china
J Knockel, M Crete-Nishihata, JQ Ng, A Senft, JR Crandall
5th USENIX Workshop on Free and Open Communications on the Internet (FOCI 15), 2015
Chat program censorship and surveillance in China: Tracking TOM-Skype and Sina UC
JR Crandall, M Crete-Nishihata, J Knockel, S McKune, A Senft, D Tseng, ...
First Monday, 2013
Minos: Architectural support for software security through control data integrity
JR Crandall, F Chong
International Symposium on Microarchitecture 104, 2004
A security assessment of the minos architecture
JR Crandall, FT Chong
ACM SIGARCH Computer Architecture News 33 (1), 48-57, 2005
Original SYN: Finding machines hidden behind firewalls
X Zhang, J Knockel, JR Crandall
2015 IEEE Conference on Computer Communications (INFOCOM), 720-728, 2015
The ecology of malware
JR Crandall, R Ensafi, S Forrest, J Ladau, B Shebaro
Proceedings of the 2008 New Security Paradigms Workshop, 99-106, 2008
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20